Our Expert in Hong Kong
No results available
Last reviewed: 10 May 2026
Since 23 March 2026, criminal lawyers in Hong Kong have been advising clients on a fundamentally altered landscape: the implementing rules for Article 43 of the National Security Law are now in force, equipping police with explicit statutory powers to compel suspects and third parties to hand over passwords, decryption keys and other forms of electronic access. For anyone detained, investigated or simply approached by officers seeking device access, the legal stakes have risen sharply, refusal can now constitute a standalone criminal offence carrying fines and imprisonment.
This guide sets out the statutory framework, explains the new police powers Hong Kong residents and visitors must understand, and provides step-by-step practical guidance for suspects and their lawyers at every stage from on-scene encounter to pre-charge litigation.
Article 43 of the Law of the People’s Republic of China on Safeguarding National Security in the Hong Kong Special Administrative Region (commonly referred to as the national security law Hong Kong) empowers designated law-enforcement agencies to take measures necessary to investigate offences endangering national security. The provision itself is broadly drafted, it authorises searches, surveillance, asset-freezing and the interception of communications, among other tools. However, the precise mechanics of how those powers are exercised were left to subsidiary implementing rules.
Article 43 directs the HKSAR government to make implementing rules setting out the “measures, conditions and procedures” for investigative action in national security cases. The implementing rules gazetted as Legal Notice 27 of 2026 (LN27) fill that gap. They prescribe the circumstances in which officers can demand electronic access, the form of the demand, the obligations on the person receiving it, and the consequences of non-compliance. For criminal lawyers Hong Kong-wide, LN27 is now the core reference point for advising clients on compelled decryption.
| Date | Rule / Change | Practical Effect |
|---|---|---|
| 30 June 2020 | National Security Law enacted; Article 43 created framework for implementing rules | Broad police powers established in principle; compelled decryption not yet codified in detail |
| 7 July 2020 | First set of implementing rules gazetted (LN136 of 2020) | Initial procedures for searches, surveillance, asset restraint and requiring information from service providers came into force |
| 23 March 2026 | Revised implementing rules (LN27 of 2026) came into effect | Explicit powers to compel passwords and decryption assistance; new standalone offences for refusal; defined penalty brackets (fines and/or imprisonment) |
| Post-March 2026 (ongoing) | Enforcement practice and judicial interpretation developing | Early indications suggest an increase in on-scene device-access demands; proportionality and privilege arguments expected to be tested in court |
The government press release accompanying LN27 described the revised rules as necessary to address “evolving digital threats” and to provide officers with “clear and lawful procedures” for accessing encrypted electronic evidence. Industry observers expect the courts to be called upon relatively quickly to define the boundaries of these powers, particularly where legal professional privilege or journalistic material is at issue.
The short answer is: yes, in defined circumstances. Under the LN27 implementing rules, a police officer of or above a specified rank who is investigating, or assisting in the investigation of, a national security offence may issue a written requirement compelling a person to provide a password, decryption key, or other means of accessing electronic data. The requirement must state the statutory basis, describe the device or data targeted, and be served on the person in a prescribed manner. Understanding the scope of these police powers in Hong Kong is now essential for anyone carrying an encrypted device in the territory.
Not every encounter with law enforcement triggers a compulsion power. The implementing rules impose threshold conditions that must be satisfied before a lawful demand can be made:
The implementing rules refer broadly to “providing access” to electronic data. In practice, this can encompass several distinct scenarios, each with different legal and practical considerations:
The implementing rules are not unlimited. Several safeguards are built into the statutory framework:
One of the most consequential features of the LN27 implementing rules is the creation of distinct criminal offences for non-compliance with a lawful compulsion demand. Before 23 March 2026, refusal to assist police with device access might have been addressed through general obstruction charges or contempt proceedings. The passwords law 2026 changes codify specific offences with defined penalty brackets.
The implementing rules prescribe penalty ranges that include both fines and terms of imprisonment. The precise sentencing outcome will depend on the seriousness of the underlying national security investigation, the nature of the non-compliance, and any aggravating or mitigating factors. Industry observers expect that:
| Scenario | Likely Charge Severity | Practical Risk Assessment |
|---|---|---|
| Genuine inability to recall a password (credible evidence provided) | Low | Prosecution unlikely if “reasonable excuse” defence is supported by evidence (e.g. medical, complexity of password, passage of time) |
| Deliberate, silent refusal to comply with a valid notice | Medium to High | Standalone charge likely; custodial sentence possible, particularly in serious national security cases |
| Providing a wrong password deliberately / destroying data after notice | High | Aggravated offence; custodial sentence probable; additional charges (perverting justice, obstruction) may follow |
| Corporate officer refusing to provide master decryption keys | Medium | Personal criminal liability for the officer; company may face separate regulatory consequences |
The “reasonable excuse” defence is likely to become the most litigated element of these new offences. What constitutes a reasonable excuse, genuinely forgotten passwords, technical impossibility, or a good-faith belief that the demand was unlawful, will be defined case by case. Defence solicitors advising on legal defence refusal passwords scenarios should document every factual basis for a reasonable excuse contemporaneously.
Knowing the law is one thing. Knowing what to do in the moment, on the street, in a police station, during a formal interview, is another. The guidance below is designed for suspects, individuals, and the criminal lawyers Hong Kong practitioners who advise them. It follows the chronological sequence of a typical encounter.
The critical first minutes after a demand is made will shape the entire case. The following scripted responses are designed to protect rights without unnecessarily escalating the encounter:
When a device is seized, the forensic integrity of its contents becomes a live issue. Defence solicitors should advise clients to:
The tension between the right to silence and the new compulsion offences is the central dilemma for anyone facing a device-access demand. Hong Kong’s common law right to silence remains intact as a general principle, but the implementing rules create a statutory exception in the specific context of compelled decryption under Article 43. Refusing to comply is no longer simply an exercise of silence, it is a potentially criminal act.
The practical tradeoff is as follows: complying with the demand may expose data that could be used in evidence; refusing may result in a separate criminal charge. A solicitor’s role at this stage is to assess, quickly, which course of action carries the lower combined risk. Factors include the strength of the underlying national security case, the nature of the data on the device, whether privilege applies, and the client’s personal circumstances. There is no one-size-fits-all answer, but the assessment must be made before the client acts.
Where a client has already received a compulsion notice, or is facing charges for refusal, the defence strategy must be assembled rapidly. The implementing rules impose tight timelines for compliance, and delay itself may be characterised as non-compliance.
Before any charge is laid, defence solicitors should consider:
Compelled decryption engages fundamental rights. Defence arguments may include:
No reported judgments on the LN27 compelled-decryption provisions have been handed down as of the date of this article. However, the likely practical effect, based on analogous Hong Kong case law and comparative common law jurisdictions, is that courts will adopt a two-stage test: first, whether the demand was lawfully issued (procedural validity); second, whether it was proportionate in scope and necessity. Defence solicitors preparing skeleton arguments should frame submissions around both limbs.
A sample opening paragraph for a defence application to quash a compulsion order might read:
“The Applicant seeks an order quashing the Requirement dated [date] issued pursuant to the Implementing Rules for Article 43 on the grounds that (a) the Requirement was not authorised by an officer of the requisite rank; (b) the Requirement is disproportionate in that it demands access to the entirety of the Applicant’s personal device when the investigation concerns a single communication platform; and (c) the Requirement fails to make adequate provision for the identification and exclusion of legally privileged material.”
The Article 43 implementing rules do not only affect individual suspects. Employers, IT departments and in-house counsel face distinct device encryption obligations when company-owned devices are targeted by a compulsion notice.
When police serve a compulsion notice on a corporate officer or IT administrator, the company must balance cooperation with the preservation of privilege and confidential business information. The following compliance checklist is a starting point for in-house counsel:
This article was produced by Global Law Experts. For specialist advice on this topic, contact Emily Au at Emily Au Solicitor, a member of the Global Law Experts network.
If you are facing a device-access demand, have been arrested in connection with a national security investigation, or need urgent advice on compelled decryption, the following resources are available:
For additional context on Hong Kong’s evolving legal landscape, see our analysis of Hong Kong’s merger and M&A rule changes in 2026.
The 23 March 2026 implementing rules for Article 43 represent a significant expansion of police powers in Hong Kong, particularly in the realm of compelled decryption and password disclosure. For suspects, the immediate priority is to understand the new obligations and to seek legal advice before responding to any demand. For criminal lawyers in Hong Kong, the priority is to build defence strategies around procedural validity, proportionality and the developing case law on reasonable excuse. The law is new, judicial interpretation is pending, and the practical stakes, for individuals and corporations alike, are high. Early, specialist legal advice is not optional; it is essential.
posted 11 minutes ago
posted 34 minutes ago
posted 56 minutes ago
posted 2 hours ago
posted 2 hours ago
posted 2 hours ago
posted 3 hours ago
posted 3 hours ago
posted 4 hours ago
posted 4 hours ago
posted 4 hours ago
posted 5 hours ago
No results available
Find the right Legal Expert for your business
Sign up for the latest legal briefings and news within Global Law Experts’ community, as well as a whole host of features, editorial and conference updates direct to your email inbox.
Naturally you can unsubscribe at any time.
Global Law Experts is dedicated to providing exceptional legal services to clients around the world. With a vast network of highly skilled and experienced lawyers, we are committed to delivering innovative and tailored solutions to meet the diverse needs of our clients in various jurisdictions.
Global Law Experts is dedicated to providing exceptional legal services to clients around the world. With a vast network of highly skilled and experienced lawyers, we are committed to delivering innovative and tailored solutions to meet the diverse needs of our clients in various jurisdictions.
Send welcome message